Microsoft's official telemetry list We do a lot to protect our privacy. Until recently, the HOSTS file could still be used as an effective tool, but [...]Continue reading "
Write Record to Hosts File With this batch file we add any entries to the hosts file. This batch file does not have to be executed with elevated rights. […]Continue reading "
What damage does a virus do? There is an online service to upload suspicious files and have them analyzed. The file is opened using the “Submit […]Continue reading "
Encrypt Windows folder hide lock This is only one of many tools, but it raises questions. More on that in the end. Access to a […]Continue reading "
Read large Log Files We all know the annoyance, I'm sure. There is a problem with an application and want to analyze […]Continue reading "
DNS name resolution - dynamic databases and statistical tables How does a computer actually find another computer in the network? The magic word is DNS. DNS stands for […]Continue reading "
Calculate file checksums With the Microsoft tool fciv.exe "File Checksum Integrity Verifier" we create checksums for checking data integrity. Especially after a small file migration […]Continue reading "
Emotet local blacklist To protect yourself in the home area, I recommend editing the hosts file under C: \ Windows \ system32 \ drivers \ etc. Either you add the attached list below the […]Continue reading "
Data migration only create the folder structure With the old xcopy command this can be done in seconds. Specify source and destination. xcopy D: \ DATA \ DESKTOP S: \ data migration / T / E […]Continue reading "